Category Banner

Trend Micro will assess your security posture with just 25 simple questions

Basic information and questions/Assessment result

Mobile

To start, please indicate your industry, company size, and job title in the menu at the right. This allows us to provide a comparison to all respondents, and allows you to compare your current security posture with the averages of your peers.

Answer the 25 questions below then click Start Assessment to submit your answers for instant analysis.

Industry
Job title
Size(number of employees)
Country
Name
Company
Email
Bussiness Number
Mobile

Questions

[Question 1] Authentication of devices or users is adopted for smartphones and tablets that connect to our corporate network.
[Question 2] Encryption is used for network communication between smartphones or tablets and our corporate network.
[Question 3] Anti-malware is deployed to smartphones and tablets.
[Question 4] A tool that blocks access to malicious websites is deployed to smartphones and tablets.
[Question 5] URL filtering that prevents access to unwanted/inappropriate Web sites is deployed to smartphones and tablets.
[Question 6] We have a security policy and measures on BYOD that allows personal devices being connected to the corporate network.
[Question 7] We have an inventory of smartphones, tablets, smart operating systems, and applications.
[Question 8] We are controlling the internal services and cloud services that smartphones and tablets are allowed to connect to.
[Question 9] We are controlling which applications which can be installed and used on smartphones and tablets.
[Question 10] Smart operating systems and applications are kept up-to-date to minimize vulnerabilities.
[Question 11] We have clear objectives and scope for adopting smartphones and tablets for business.
[Question 12] We have identified the groups and individuals that can use smartphones and tablets based upon business objectives.
[Question 13] We understand the advantages and disadvantages of using smartphones or tablets.
[Question 14] We understand the security risks associated with smartphones, tablets and smart operating systems.
[Question 15] We have clear evaluation criteria or requirements on choosing smartphones, tablets or smart operating systems from a security perspective.
[Question 16] A security policy on using smartphones and tablets exists within our organization, and is shared and communicated with employees.
[Question 17] A process for handling security incidents on smartphones or tablets is documented.
[Question 18] We have dedicated resources, either inside or outside the organization, to handle security incidents on smartphones or tablets.
[Question 19] We educate and warn users on how to use smartphones and tablets.
[Question 20] We use a solution (including Mobile Device Management or MDM) that allows us to enforce mobile policy and configuration options as well as gives us visibility into device status.
[Question 21] A password or PIN (Personally Identifiable Number) is enforced on smartphones and tablets that connect to our corporate network.
[Question 22] Data stored on smartphone or tablet devices is encrypted.
[Question 23] Remote lock functionality is enabled in case of the loss of smartphones or tablets.
[Question 24] Remote GPS tracking or alarm functionality is enabled in case of the loss of smartphones or tablets.
[Question 25] Automatic erasure or remote wipe functionality is enabled in case of the loss of smartphones or tablets.
Top of page